• Paint on Your iPad | Color

    Updated: 2012-10-31 17:07:57
    via vimeo.com Posted via email from danielmiessler.com | posterous

  • Porticor Data Security Platform Designed for Cloud

    Updated: 2012-10-31 13:45:00
    The Virtual Private Data (VPD) cloud-based data encryption solution uses a homomorphic key-encryption approach and encrypts the entire data layer.

  • Fortinet, Bradford Networks Partner on BYOD Security

    Updated: 2012-10-31 12:15:00
    The platform offers a full security solution for corporate-owned and personal mobile devices, including malware detection and automatic discovery.

  • Claims Based Identity: What does it Mean to You? (Part 2)

    Updated: 2012-10-31 09:00:08
    In this Part 2 we'll start taking a look at how Microsoft is integrating claims based identity into its products and services.

  • New Logo

    Updated: 2012-10-31 07:08:00
    [I agree the tree is hideous; can anyone help get this tree in there instead? ] I’ve come up with a tentative design for my new logo and I’m curious as to what you guys think of it. Naturally, I’ll be updating the site with a color pallette that matches the blue, so don’t worry [...]

  • ISC StormCast for Wednesday, October 31st 2012 http://isc.sans.edu/podcastdetail.html?id=2908, (Wed, Oct 31st)

    Updated: 2012-10-31 00:45:13
    ...(more)...

  • Network Security Podcast, Episode 294

    Updated: 2012-10-30 23:53:20
    Rich is playing super-secret secret-squirrel in an undisclosed location (actually he’s teaching multiple talks at a conference in Arizona), so Martin and Zach run the gamut from their own recent conference tomfoolery, to China’s “goodbye Cisco!” move, to “how do i shot honeypots”, and a few other things in between. Also, Zach takes a few [...]

  • Memoto Begins What Will Become Lifecasting

    Updated: 2012-10-30 23:04:24
    And so it begins.

  • Cyber Security Awareness Month - Day 30 - DSD 35 mitigating controls, (Tue, Oct 30th)

    Updated: 2012-10-30 18:47:10
    Nearing the end of the month it would be remiss not to mention the DSD 35 mitigating strategies.&nbs ...(more)...

  • Nessus Scanning Windows 8 Hosts

    Updated: 2012-10-30 17:25:00

  • Splunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4, (Tue, Oct 30th)

    Updated: 2012-10-30 16:07:18
    ...(more)...

  • Windows 8 Enables Microsoft to Take Stronger Role in Trusted Security

    Updated: 2012-10-30 12:15:00
    Trusted Computing features were little noticed in Windows 7, but will get more attention in the new Windows 8 as DirectAccess technology bolsters PC security with support for virtual smart cards.

  • 8 Things You Should Probably Start Doing Immediately

    Updated: 2012-10-30 09:56:07
    A recent reading/discovery phase has lead me to the following life workflow gems. Get a Personal Assistant Through Fancy Hands Fancy Hands is a digital personal assistant service where you subscribe to a number of requests per time period. Here are some examples of what you can do with them: Call Allen Car in NYC [...]

  • Hurricane Sandy Update, (Tue, Oct 30th)

    Updated: 2012-10-30 00:46:19
    Last nights storm cut power to millions of households across much of the north east of the US and pa ...(more)...

  • ISC StormCast for Tuesday, October 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2905, (Tue, Oct 30th)

    Updated: 2012-10-30 00:44:17
    ...(more)...

  • North Carolina Teacher Quits | Diana Ravitch

    Updated: 2012-10-29 23:17:28
    I’m tired of watching my students produce amazing things, which show their true understanding of 21st century skills, only to see their looks of disappointment when they don’t meet the arbitrary expectations of low-level state and district tests that do not assess their skills. I refuse to hear any more about how important it is [...]

  • Massive Data Breach Hits South Carolina State Tax System

    Updated: 2012-10-29 20:45:00
    The latest breach shows that state and local governments as well as private corporations need to better lock down their data and perform regular security assessments, security experts say.

  • Anonymous Launching Wikileaks Clone Called “TYLER” | HITBSecNews

    Updated: 2012-10-29 17:28:31
    The project is called TYLER, and will be based on decentralized, peer-to-peer technology rather than fixed, dedicated servers. If successful, in the same way as torrents need seeding parties, user participation will be necessary to keep information flowing. The hackers claim that this kind of project setup will be next to impossible to close or [...]

  • Visualizing TCP/IP Port Connections on the Internet | Jay Jacobs

    Updated: 2012-10-29 17:10:13
    via youtube.com Posted via email from danielmiessler.com | posterous

  • BJ Fogg’s Behavior Model

    Updated: 2012-10-29 17:06:11
    My Behavior Model shows that three elements must converge at the same moment for a behavior to occur: Motivation, Ability, and Trigger. When a behavior does not occur, at least one of those three elements is missing. via behaviormodel.org Posted via email from danielmiessler.com | posterous

  • TSA PreCheck Flaw | Puckinflight

    Updated: 2012-10-29 17:00:04
    What  terrorists  or really anyone can do is use a website to decode the barcode and get the flight information, put it into a text file, change the 1 to a 3, then use another website to re-encode it into a barcode. Finally, using a commercial photo-editing program or any program that can edit graphics [...]

  • VMware Revenues Show Cloud Worries

    Updated: 2012-10-29 15:53:00

  • 5 Tips for Information Security with Sandy

    Updated: 2012-10-29 15:45:28
    Most information security tips deal with protecting your business and private data from malicious attacks but what should you do when the threat comes from Mother Nature herself in the form of an unpredictable Frankenstorm? The following 5 tips will help you prevent any loss of data and damage otherwise to your IT infrastructure.

  • MIT Researchers Turn Heads With WLAN Tech: Coded TCP

    Updated: 2012-10-29 14:58:00
    : Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Lee H . Badman Bio Archive Lee H . Badman Network Computing Blogger Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization ,

  • Cyber Security Awareness Month - Day 29 - Clear Desk: The Unacquainted Standard, (Mon, Oct 29th)

    Updated: 2012-10-29 14:15:50
    A Clear Standard A Clear Desk Policy is becoming a more commonly adopted STANDARD ...(more)...

  • Nessus Scanning Strategies for Consultants

    Updated: 2012-10-29 13:08:09

  • Sybase Adaptive Server Enterprise Security Patches Fail to Fix Flaws

    Updated: 2012-10-29 12:30:00
    Sybase has a new round of patches on the way to replace updates to its Adaptive Server Enterprise product that did not fully fix 10 vulnerabilities.

  • Diversinet Upgrades Mobile Health Security Platform

    Updated: 2012-10-29 12:20:00
    Diversinet has enhanced its MobiSecure platform for health care to allow doctors and patients to send messages back and forth securely.

  • Women Diss Their Beta Partners During Ovulation

    Updated: 2012-10-29 07:50:08
    As women mated to less sexually attractive men moved from their least fertile to most fertile period, their closeness scores dropped one point on a seven-point scale. Women mated to the most sexually attractive men, meanwhile, experienced the opposite effect. As these women moved from their least to most fertile period, their closeness scores rose [...]

  • ISC StormCast for Monday, October 29th 2012 http://isc.sans.edu/podcastdetail.html?id=2902, (Mon, Oct 29th)

    Updated: 2012-10-29 00:24:35
    ...(more)...

  • Firefox 16.02 Released, (Sun, Oct 28th)

    Updated: 2012-10-28 16:25:27
    Just a quick note today to say thank you to one of our readers, Paul, for the note that Firefox 16.0 ...(more)...

  • Startup Aryaka Unveils Application Delivery-as-a-Service

    Updated: 2012-10-26 22:49:00
    Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your company

  • Cyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant , (Fri, Oct 26th)

    Updated: 2012-10-26 20:56:14
    Here on Day 26 of Cyber Security Awareness Month, as the ISC focuses on standards, we received a ver ...(more)...

  • Windows 8 Security: Mostly Good, Some Bad

    Updated: 2012-10-26 18:40:00
    Even though Microsoft's Windows 8 is not specifically a security release, the new Secure Boot and better memory management hardens the desktop against attackers.

  • Designing My New Logo

    Updated: 2012-10-26 07:09:41
    I need some help designing my new logo. It’s going to be super simple–circular with something in the center that represents me or the site. [ Ok, so I think I'm going to go with the tree. Does anyone have the graphics skills to put a nice symmetrical tree in to this graphic? ] Here [...]

  • The Evolution of Music Tastes | Steve Klabnik

    Updated: 2012-10-26 05:10:30
    Here’s the thing: once I finally admitted to myself that I enjoy terrible pop music and stopped trying to apologize for my taste, I realized I was way more productive. Upbeat music with a vaguely positive vibe means I get shit done. Way better than the heavy, dreary, angry stuff I listened to in the [...]

  • 451 Research Declares VAST Program a One-Stop Shop for Enterprise Application Security

    Updated: 2012-10-25 19:24:01
    In a new report by 451 Research, the enterprise IT innovation firm our new VAST program is highlighted for it's ability to lower the barriers of application security testing for enterprises. Says CEO Bob Brennan; "VAST was created to increase the security of buying software. We work with enterprises to define the level of security they should expect and then we work with their vendors to see that those expectations are met."

  • The Job Board @ AppSecUSA: AppSec Skills = Hired

    Updated: 2012-10-25 19:00:50
    :

  • AMD, Intel Partner to Form Cyber Security Research Alliance

    Updated: 2012-10-25 13:30:00
    The focus of the CSRA is to tackle the biggest challenges in cyber security, including research and working groups in areas like threat migration.

  • Monitoring the Life of a Java Zero-Day Exploit with Tenable USM

    Updated: 2012-10-25 12:00:00

  • Tenable Nessus - Voted WindowSecurity.com Readers' Choice Award Winner - Security Scanner Software

    Updated: 2012-10-25 10:00:01
    Tenable Nessus was selected the winner in the Security Scanner Software category of the WindowSecurity.com Readers' Choice Awards. Acunetix Web Vulnerability Scanner and ManageEngine Security Manager Plus were runner-up and second runner-up respectively.

  • Linux Backdoor With Metasploit

    Updated: 2012-10-25 09:52:00

  • BYOD: A Comprehensive Guide

    Updated: 2012-10-24 19:38:00
    : Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers End to End APM IPv6 Next Gen Network Private Cloud Public Cloud Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Mike Fratto David Hill Jeff Loughridge Howard Marks Joe Onisick Art Wittmann Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data center advances-that help position your

  • Mitigating Risks with Vendor-Supplied Software

    Updated: 2012-10-24 18:17:40
    We recently hosted a webinar featuring Chenxi Wang of Forrester Research Inc and Chad Holmes of Veracode that discussed how enterprises can better understand and reduce security risks associated with using vendor-supplied software. This blog post will highlight the key takeaways of the webinar.

  • Use This | Colleen Wainwright

    Updated: 2012-10-24 07:16:58
    I keep a handwritten journal in the cheapest wide-rule spiral notebooks I can find, using a Waterman Phileas: red, medium-nib with blue ink. I also burn through a prodigious amount of old-school Sharpies and 3×5 index cards, both ruled and blank varieties. And I am almost never without a battered, beat-to-hell Field Notes notebook. Oh, [...]

  • Use This | Rob Pike

    Updated: 2012-10-24 07:13:58
    Twenty years ago, you expected a phone to be provided everywhere you went, and that phone worked the same everywhere. At a friend’s house, or a restaurant, or a hotel, or a pay phone, you could pick up the receiver and make a call. You didn’t carry a phone around with you; phones were part [...]

  • Endpoint Security: Isn't It Obvious!?

    Updated: 2012-10-24 07:00:04
    In this article the author discusses endpoint security and what precautions you can take to reduce the attack surface.

  • Snuch - Automatic XSS filter bypass

    Updated: 2012-10-24 05:21:00

  • Reality Check: FiveThirtyEight Has Obama as a 70% Favorite

    Updated: 2012-10-23 23:08:16
    :

  • The Happy Secret to Better Work | TED

    Updated: 2012-10-23 21:56:46
    An extraordinary presentation, on many levels.

  • Zagg Keyboard for iPad

    Updated: 2012-10-23 21:43:57
    As part of my workflow I am looking to do more with remote coding via iPad, SSH, and tmux. As part of that I’ve purchased a keyboard for my iPad–the Zagg Backlit Pro model. I’m quite pleased with it. Anyone else using a keyboard with their iPad in an attempt to be more effective without [...]

  • RIT InfoSec Awareness an Interview With Ben Woelk

    Updated: 2012-10-23 15:57:35
    A short while ago I stumbled onto the Twitter account of an Information Security Awareness program at my alma mater the Rochester Institute of Technology (RIT). I was immediately impressed by the following they had among their social networks and after digging a bit deeper into their activities I couldn't help but reach out to Ben Woelk who manages the group and generously agreed to an interview with us.

  • Uncovering SSL Anomalies In Your Network Using SecurityCenter

    Updated: 2012-10-23 04:34:48
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • Small Business Online Security Infographic from NCSA

    Updated: 2012-10-22 21:22:42
    Last week the National Cyber Security Alliance published this great infographic in collaboration with Symantec on the topic of Small Business Online Security. With more small businesses leveraging web applications and collecting and storing customer data online the need for cybersecurity awareness has never been greater. The graphic is a part of NCSA's awareness campaign for National Cyber Security Awareness Month, visit their website staysafeonline.org to catch up with the rest of their efforts!

  • Site Redesign in Progress

    Updated: 2012-10-22 19:01:29
    web survey I’m looking to do a pretty major redesign of the site in the next few months, and I’ve started already. The general concepts are: Simplicity and legibility A minimalist feel Even better performance Focus on current content This has materialized as: I’ve removed the sidebars from the site. They basically added a lot [...]

  • Profit vs. The Middle Class

    Updated: 2012-10-22 18:38:19
    .

  • Android: Latest alpha (4.2) promises big security improvements | Mobile Monday Update

    Updated: 2012-10-22 16:26:12
    An early teardown of Android’s latest alpha release shows some very promising security improvements including: client side malware protection, Security Enhanced Linux, and always-on VPN. App Check Early this year Google made news with the announcement of Bouncer – an automated server side malware scanning service—in the hopes of cleaning up Android’s reputation as being a less secure platform [...]

  • Malware in Medical Equipment Poses Serious Threat to Hospital Security

    Updated: 2012-10-22 14:00:00
    With multiple versions of Windows running on medical systems, hospitals are looking to prevent malware from spreading on networks and threatening patients' privacy and potentially even their lives.

  • Laudanum - Collection Of Injecatable Files.

    Updated: 2012-10-21 02:28:00

  • Check DoS Vulnerability Of Apache Web Server Multiple Overlapping/simple ranges of a page[CVE-2011-3192] with NMAP NSE

    Updated: 2012-10-19 01:40:00

  • Oracle Database Authentication Protocol Security Bypass - Packetstorm

    Updated: 2012-10-19 01:38:00

  • #1 Nessus is an Enterprise Tool - Top Ten Things You Didn't Know About Nessus

    Updated: 2012-10-18 12:00:00
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • Post Exploit By Stormsecurity

    Updated: 2012-10-18 07:16:00

  • DDOS make requests through google servers By Anonymous

    Updated: 2012-10-18 07:14:00

  • Fingerprint website with web application

    Updated: 2012-10-17 11:05:00

  • Evilgrade Proxy [Ruby] by bigmac

    Updated: 2012-10-17 08:15:00

  • Key Cloud Privacy Concerns in 2012

    Updated: 2012-10-17 07:00:01
    This article covers major concerns that companies have when data is stored and processed in the cloud, and things that can be done to better protect against the threat vector.

  • Nessus Patch Management Integration Now Supports IBM Tivoli Endpoint Manager

    Updated: 2012-10-16 04:50:00
    : Careers News Events About Tenable Contact Support Enter search text Solutions Solutions Overview Compliance Configuration Auditing Continuous Monitoring Federal Government Log Management Mobile Device Security SCADA Security Compliance SIEM Vulnerability Management Vulnerability Scanning Products Products Overview Nessus Scanner SecurityCenter Log Correlation Engine Passive Vulnerability Scanner Services Services Overview Nessus Perimeter Service QuickStart Services Partners Partners Overview Become a Partner Strategic Partners Enterprise Channel Partners Subscription Channel Partners Professional Services Partners Training Certification Training Certification Overview Become Certified Courses Delivery Methods Training Schedule eLearning Portal Resources Resources Overview Podcasts RSS

  • MS SQL Cross-Site Scripting (XSS) News – October 2012

    Updated: 2012-10-15 21:00:53
    Eight new audits are being released in our Retina vulnerability scan engine to help close a security vulnerability that can enable an attacker to gain control of a MS SQL Database Server running SQL Reporting Services via Cross-Site Scripting (CVE-2012-2552, MS12-070). These eight new audits have been released with Retina Network Community and the commercial [...]

  • Analyzing Nessus Detected Malicious Processes Activity with the Log Correlation Engine

    Updated: 2012-10-15 11:49:35

  • Metasploit stager: reverse_https with basic authentication against proxy

    Updated: 2012-10-15 01:01:00

  • adbdSecure - Malicious Toolkit Thwarted

    Updated: 2012-10-15 00:51:00

  • Server Shield v1.0.4 - Hardening Linux Server

    Updated: 2012-10-15 00:47:00

  • Privilege Identity Management – A Help Desk Perspective

    Updated: 2012-10-12 15:00:25
    Help desk technicians within a company are the first line of defensive for a new project or system problem. Most of the time, they are informed and trained that users will be getting a new piece of security software. The solution, in this case, is called Privileged Identity Management (PIM) and is designed to manage authenticated permissions [...]

  • dSploit - an Android network analysis

    Updated: 2012-10-12 03:50:00

  • PowerBroker for Windows – Solution Deployment

    Updated: 2012-10-11 15:00:07
    PowerBroker for Windows (PBW) is designed to integrate directly into your corporate Active Directory (AD) structure without modifying your existing schema. In the asset labeled “1” below, an administrator simply loads a Group Policy Option (GPO) snap-in onto an asset that uses the Microsoft Management Console (MMC).  The administrator can then create policies and rules [...]

  • Safe3 sql injector - Powerful penetration testing tool for SQL Injection

    Updated: 2012-10-10 15:26:00

  • Cast Your Vote for eSoft

    Updated: 2012-10-10 15:17:48
    SC Magazine Awards is the network security industry's leading global awards program, organized to honor the professionals, companies and products that help fend off the myriad security threats confronted in today's corporate world. eSoft is proud to announce the nomination for the following SC Magazine Readers Trust Awards: Best Customer Service Readers Choice UTM CAST YOUR VOTE NOW! - http://bit.ly/O8hUNn

  • Claims Based Identity: What does it Mean to You? (Part 1)

    Updated: 2012-10-10 07:00:08
    This article series explores the identity management dilemma by addressing some of the more specific implementation of identity technologies.

  • NetSecMicrocast: Davidoff & Ham

    Updated: 2012-10-10 01:57:07
    I got to catch up to a couple of friends of mine, Sherri Davidoff and Jonathan Ham, a few weeks ago.  They recently released a book called Network Forensics: Tracking Hackers Through Cyberspace.  The pair talk about what goes into creating a lab in preparation for a book like this, about Internet Pigeon Protocols and [...]

  • Disabling UAC confirmation messages - UAControl

    Updated: 2012-10-08 17:40:00

  • Howto: see PHP source code in a file inclusion

    Updated: 2012-10-08 17:38:00

  • Mobile Pwn2Own Exploits in Action | Mobile Monday Update

    Updated: 2012-10-08 16:57:05
    The security scene has been eventful since our last Mobile Monday thanks to the Mobile Pwn2Own competition in Amsterdam.  Both Android and iOS were vulnerable to some pretty unique exploits. iOS (including iPhone 5) Confirmed vulnerable: iOS 5.1.1 and iOS6 across all devices Exploit allows attackers to grab your contacts and photos Dutch security researchers, [...]

  • Howto: SOCKS Proxy over SSH with OpenSSH By Cuong

    Updated: 2012-10-08 05:22:00

  • Kernel Rootkit On Mac OSX 64Bit

    Updated: 2012-10-07 09:28:00

  • List Of Input Validation and Representation

    Updated: 2012-10-06 01:46:00

  • Are Mobile Messaging Apps and Social Media Putting you at Risk?

    Updated: 2012-10-06 00:14:16
    Mobile Usage Continues to Shift Away from Voice Mobile usage has continued to shift away from carrier voice calls and towards use of text messaging and communication through social media (Twitter, Facebook, etc.).   While offering convenience, these new forms of messaging may pose greater security risks to consumers and enterprise customers. Mobile has been taking [...]

  • PowerBroker Mobile on a $35 Linux Box

    Updated: 2012-10-04 18:24:36
    Scaling up SaaS is more than just architecture A lot of time and effort went into PowerBroker Mobile as a SaaS solution, we spent a lot of time designing the most scalable, fault resistant system possible. What we came up with was a system that could scale across multiple geographic regions with no single point [...]

Current Feed Items | Previous Months Items

Sep 2012 | Aug 2012 | Jul 2012 | Jun 2012 | May 2012 | Apr 2012